{"title":"Spearphishing Malware: Do We Really Know the Unknown?","authors":"Yanko Baychev, Leyla Bilge","doi":"10.1007/978-3-319-93411-2_3","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_3","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122246364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps","authors":"Michael Brengel, C. Rossow","doi":"10.1007/978-3-319-93411-2_2","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_2","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124727392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Paria Shirani, L. Collard, B. Agba, Bernard Lebel, M. Debbabi, Lingyu Wang, Aiman Hanna
{"title":"BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices","authors":"Paria Shirani, L. Collard, B. Agba, Bernard Lebel, M. Debbabi, Lingyu Wang, Aiman Hanna","doi":"10.1007/978-3-319-93411-2_6","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_6","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129656377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rui Tanabe, Wataru Ueno, Kou Ishii, K. Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, D. Inoue, C. Rossow
{"title":"Evasive Malware via Identifier Implanting","authors":"Rui Tanabe, Wataru Ueno, Kou Ishii, K. Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, D. Inoue, C. Rossow","doi":"10.1007/978-3-319-93411-2_8","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_8","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"112 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120868557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"No Random, No Ransom: A Key to Stop Cryptographic Ransomware","authors":"Ziya Alper Genç, G. Lenzini, P. Ryan","doi":"10.1007/978-3-319-93411-2_11","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_11","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128191332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Update State Tampering: A Novel Adversary Post-compromise Technique on Cyber Threats","authors":"Sungjin Kim, B. Kim, H. Kim, Dong Hoon Lee","doi":"10.1007/978-3-319-93411-2_7","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_7","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132689548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knockin' on Trackers' Door: Large-Scale Automatic Analysis of Web Tracking","authors":"Iskander Sánchez-Rola, I. Santos","doi":"10.1007/978-3-319-93411-2_13","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_13","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117301174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Taemin Park, Julian Lettner, Yeoul Na, Stijn Volckaert, M. Franz
{"title":"Bytecode Corruption Attacks Are Real - And How to Defend Against Them","authors":"Taemin Park, Julian Lettner, Yeoul Na, Stijn Volckaert, M. Franz","doi":"10.1007/978-3-319-93411-2_15","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_15","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133564535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Teryl Taylor, F. Araujo, Anne Kohlbrenner, M. Stoecklin
{"title":"Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception","authors":"Teryl Taylor, F. Araujo, Anne Kohlbrenner, M. Stoecklin","doi":"10.1007/978-3-319-93411-2_12","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_12","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115302513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis","authors":"Giorgio Severi, T. Leek, Brendan Dolan-Gavitt","doi":"10.1007/978-3-319-93411-2_1","DOIUrl":"https://doi.org/10.1007/978-3-319-93411-2_1","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121763574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}